Anyone know who runs the PDGA site? Is it possible that it is compromised?

I think Dave Gentry helps run the site. Unfortunately I do not have his email address. I would guess that they sold an ad spot to somebody that has put some "bad code" in their little flash/flex based ad. But it could be like Parks stated, the site could be fully compromised.

d2 wrote:I posted this in Babble, but realized this is pretty big so I am also posting this here to get better coverage:

Google Chrome & Firefox can no longer be used to effectively visit PDGA->discussions. Chrome & Firefox report the following:

Google wrote:Of the 138 pages we tested on the site over the past 90 days, 26 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2011-04-11, and the last time suspicious content was found on this site was on 2011-04-10.Malicious software includes 7 trojan(s). Successful infection resulted in an average of 1 new process(es) on the target machine.

I went to the site this morning with IE in a clean Virtual Machine that I plan to revert back to clean, and got the following:

IE wrote:Internet Explorer has closed this webpage to help protect your computer. A malfunctioning or malicious add-on has caused Internet Explorer to close this webpage.

This tells me that effective today, the PDGA site is still delivering zero day malware!

19% of the PDGA discussion pages that get served deliver zero-day malware:If you viewed 10 messages on the discussion board with Internet Explorer (32 bit), then you have an 88% chance of currently owning an infected computer. After 37 messages, then the odds statistically round to 100%.

Your computer is NOT safe even if you are running anti-virus software!

d2 wrote:I was just on the PDGA site, and it is still delivering malware! Do not goto the PDGA site unless you really know what you are doing with computer security!Here is an informative reply:

Kette_Master wrote:So, is there an issue with pdga.com being a malware distributor?

Well, I have an issue with visiting a web site that delivers malware .

When Google states "79 page(s) resulted in malicious software being downloaded and installed without user consent. ", they obviously mean that malware was installed due to content distrubuted directly or indirectly from the site! I would LOVE to know what browsers were actually affected.

Personally, I plan to no longer use the PDGA to pre-register for any tournaments. I have not figured out how I will register for the PDGA next year; because I do not trust the PDGA with my credit card information.

I agree that "MOST LIKELY" the PDGA is using a "third rate" ad server company. I suspect that this company is trying to vet ads that it delivers to ensure that they are malware free; however, that job is really difficult! My guess is Google is doing a better job of vetting the ads. However, that is a guess. AFAIK, the PDGA may not even be capable of accessing their security risks.

I thought that perhaps the PDGA would immediately terminate the ad content based on being called out. However, my system is still getting zero day thrown at it. I hope that they at least look into the legal requirements of reporting security breaches.

You should also be aware that in the past many people knew immediately when they had malware installed due to browser redirects or "Fake Anti-Virus" software getting installed. However, there is a big shift to "silent malware" that just steals your personal data.

Or be thorough and run anti-malware tools from a UBCD4WIN boot cd or something similar, and then also run something like Malwarebytes when you boot back into your OS to catch anything it missed that loads into memory.

The only problem I have with stuff like Malwarebytes is that it detects malware loaded into memory, but if a program is loaded into memory then it can have low-level control and hide itself from Malwarebytes. However, some stuff might be missed by a pre-installation environment like UBCD4WIN uses because it can only pick stuff up off your storage, so you should run it to make sure.

You can also download Avast AVS(I have been using the free version on one of my home pc's for close to 18 months now). Avast will do a boot/memory scan after it first installs. Amazing some of the stuff it picks up. You can also have it do a boot/memory scan everytime your system reboots.

Is the site ok now? I haven't visited that site since i heard of the problems. Might as well registrate for the forums now that i'm a member.

Flat shots need running on the center line of the tee and planting each step on the center line. Anhyzer needs running from rear right to front left with the plant step hitting the ground to the left of the line you're running on. Hyzer is the mirror of that.